6G endogenous security:architecture and key technologies

At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on so...

Full description

Saved in:
Bibliographic Details
Main Authors: Yang LIU, Mugen PENG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2020-01-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020011/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530631954104320
author Yang LIU
Mugen PENG
author_facet Yang LIU
Mugen PENG
author_sort Yang LIU
collection DOAJ
description At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.
format Article
id doaj-art-e991398d880948e88130ec39cb60f53c
institution Kabale University
issn 1000-0801
language zho
publishDate 2020-01-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-e991398d880948e88130ec39cb60f53c2025-01-15T03:01:14ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-01-01361120595850506G endogenous security:architecture and key technologiesYang LIUMugen PENGAt the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020011/6Gendogenous securityarchitecturekey technology
spellingShingle Yang LIU
Mugen PENG
6G endogenous security:architecture and key technologies
Dianxin kexue
6G
endogenous security
architecture
key technology
title 6G endogenous security:architecture and key technologies
title_full 6G endogenous security:architecture and key technologies
title_fullStr 6G endogenous security:architecture and key technologies
title_full_unstemmed 6G endogenous security:architecture and key technologies
title_short 6G endogenous security:architecture and key technologies
title_sort 6g endogenous security architecture and key technologies
topic 6G
endogenous security
architecture
key technology
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020011/
work_keys_str_mv AT yangliu 6gendogenoussecurityarchitectureandkeytechnologies
AT mugenpeng 6gendogenoussecurityarchitectureandkeytechnologies